Paper
17 July 2015 Ghost-secured imaging via pixel modulation of one phase-only mask
Wen Chen, Xudong Chen
Author Affiliations +
Proceedings Volume 9524, International Conference on Optical and Photonic Engineering (icOPEN 2015); 952419 (2015) https://doi.org/10.1117/12.2189424
Event: International Conference on Optical and Photonic Engineering (icOPEN2015), 2015, Singapore, Singapore
Abstract
It is well known that in ghost imaging, a large number of random phase-only masks should be applied for generating a series of reference intensity patterns. Hence, it is always concerned that data storage or transmission might be tedious in some applications. In this paper, we report how only one random phaseonly mask should be pre-generated to be stored or transmitted for ghost-imaging-based optical encryption system with sufficiently guaranteed security. During optical encoding, a method, called pixel modulation, is developed and applied to sequentially modulate this random phase-only mask. Since pixel modulation strategy possesses high invisibility and randomness, high security is guaranteed in the proposed optical system. In addition, only one random phase-only mask and sparsely binary maps are stored or transmitted as principal keys for the decoding, hence potential problem in conventional optical security systems is effectively mitigated.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Wen Chen and Xudong Chen "Ghost-secured imaging via pixel modulation of one phase-only mask", Proc. SPIE 9524, International Conference on Optical and Photonic Engineering (icOPEN 2015), 952419 (17 July 2015); https://doi.org/10.1117/12.2189424
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Phase shift keying

Modulation

Information security

Computer programming

Binary data

Imaging systems

Computer security

Back to Top